{"id":"https://openalex.org/W4415480992","doi":"https://doi.org/10.1145/3704413.3764466","title":"Building Trust in IQ-Based Deep Learning Models for Wireless Applications","display_name":"Building Trust in IQ-Based Deep Learning Models for Wireless Applications","publication_year":2025,"publication_date":"2025-10-23","ids":{"openalex":"https://openalex.org/W4415480992","doi":"https://doi.org/10.1145/3704413.3764466"},"language":null,"primary_location":{"id":"doi:10.1145/3704413.3764466","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704413.3764466","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704413.3764466","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-sixth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3704413.3764466","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093680603","display_name":"Sage Trudeau","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]},{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sage Trudeau","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA, USA","University of Texas at Austin, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA, USA","institution_ids":["https://openalex.org/I4210122954"]},{"raw_affiliation_string":"University of Texas at Austin, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080483470","display_name":"Kaushik Chowdhury","orcid":"https://orcid.org/0000-0002-3570-2622"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaushik Chowdhury","raw_affiliation_strings":["University of Texas at Austin, Austin, Tx, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Austin, Austin, Tx, USA","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5093680603"],"corresponding_institution_ids":["https://openalex.org/I4210122954","https://openalex.org/I86519309"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15757928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"381","last_page":"390"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6668999791145325},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.6018999814987183},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5860000252723694},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5343999862670898},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4731000065803528},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4408999979496002},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.398499995470047},{"id":"https://openalex.org/keywords/ground-truth","display_name":"Ground truth","score":0.33629998564720154}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6974999904632568},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6668999791145325},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.6018999814987183},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5860000252723694},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5343999862670898},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5026999711990356},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4731000065803528},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4503999948501587},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4408999979496002},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.398499995470047},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3458999991416931},{"id":"https://openalex.org/C146849305","wikidata":"https://www.wikidata.org/wiki/Q370766","display_name":"Ground truth","level":2,"score":0.33629998564720154},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.33500000834465027},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.31380000710487366},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.3116999864578247},{"id":"https://openalex.org/C74064498","wikidata":"https://www.wikidata.org/wiki/Q3396184","display_name":"Radio frequency","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3093000054359436},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.30149999260902405},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3000999987125397},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29809999465942383},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.2856999933719635},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.27889999747276306},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.2734000086784363},{"id":"https://openalex.org/C92545706","wikidata":"https://www.wikidata.org/wiki/Q902174","display_name":"Radio spectrum","level":2,"score":0.2655999958515167},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3704413.3764466","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704413.3764466","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704413.3764466","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-sixth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3704413.3764466","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3704413.3764466","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3704413.3764466","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-sixth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G157502944","display_name":null,"funder_award_id":"2112417","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2171979393","display_name":"SMART: Spectrum-data for Machine Learning and Analysis through Robust Feature Transformations","funder_award_id":"2434043","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4664205867","display_name":null,"funder_award_id":"2526493","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4694536500","display_name":null,"funder_award_id":"FA8702-15-D-0001","funder_id":"https://openalex.org/F4320309369","funder_display_name":"Massachusetts Institute of Technology"},{"id":"https://openalex.org/G4898265301","display_name":null,"funder_award_id":"434043","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5174054272","display_name":null,"funder_award_id":"FA8702-15-D-0001","funder_id":"https://openalex.org/F4320332467","funder_display_name":"U.S. Air Force"},{"id":"https://openalex.org/G6755165505","display_name":null,"funder_award_id":"award","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320309369","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44"},{"id":"https://openalex.org/F4320332467","display_name":"U.S. Air Force","ror":"https://ror.org/006gmme17"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415480992.pdf"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2295107390","https://openalex.org/W2773170971","https://openalex.org/W2962858109","https://openalex.org/W2982145123","https://openalex.org/W3035253074","https://openalex.org/W3111389230","https://openalex.org/W3162073908","https://openalex.org/W3172135703","https://openalex.org/W3199070602","https://openalex.org/W3199098590"],"related_works":[],"abstract_inverted_index":{"The":[0],"dynamic":[1],"nature":[2],"of":[3,79,186],"wireless":[4],"environments":[5],"presents":[6],"significant":[7],"challenges":[8,33],"for":[9,51,192],"machine":[10],"learning":[11],"(ML)":[12],"models":[13,54],"in":[14,37,93,124,131,135,174],"real-world":[15],"radio":[16],"frequency":[17,26],"applications,":[18],"where":[19,146],"impairments":[20,64],"such":[21,138,163],"as":[22,139,151,164],"noise,":[23],"fading,":[24],"and":[25,34,65,82,95,103,188],"shifts":[27,111],"disrupt":[28],"performance.":[29],"To":[30],"address":[31],"these":[32,117],"build":[35],"trust":[36,123],"ML":[38,58,125,195],"models,":[39,137],"we":[40],"present":[41],"Augmented":[42],"Input":[43],"Resilience":[44],"Analysis":[45],"(AURA),":[46],"a":[47,76,96,152],"test":[48],"framework":[49,180],"designed":[50],"IQ-based":[52],"RF":[53,63,194],"to":[55,74,90,99,108,170,182],"rigorously":[56],"assess":[57],"model":[59,80],"performance":[60],"by":[61,113],"simulating":[62],"identifying":[66],"critical":[67,133],"vulnerabilities.":[68],"AURA":[69,119,158],"systematically":[70],"applies":[71],"test-time":[72],"augmentations":[73],"provide":[75],"detailed":[77],"examination":[78],"strengths":[81],"weaknesses.":[83],"Key":[84],"contributions":[85],"include":[86],"(1)":[87],"Score-CAM":[88],"adapted":[89],"1D":[91],"IQ":[92],"time":[94],"frequency-selective":[97],"variant":[98],"localize":[100],"spectral":[101],"features,":[102,143],"(2)":[104],"embedding":[105],"similarity":[106],"evaluation":[107],"quantify":[109],"distribution":[110],"caused":[112],"impairments.":[114],"By":[115],"integrating":[116],"methods,":[118],"enhances":[120],"interpretability,":[121],"promoting":[122],"decision-making.":[126],"We":[127],"demonstrate":[128],"AURA's":[129],"utility":[130],"exposing":[132],"vulnerabilities":[134],"well-cited":[136],"over-reliance":[140],"on":[141],"power-based":[142],"including":[144],"instances":[145],"random":[147],"noise":[148,165,176],"is":[149],"misclassified":[150],"legitimate":[153],"signal":[154],"with":[155],"99.7%":[156],"accuracy.":[157],"also":[159],"evaluates":[160],"remediation":[161],"strategies,":[162],"classes,":[166],"which":[167],"reduce":[168],"misclassifications":[169],"less":[171],"than":[172],"1%":[173],"the":[175,184],"augmentation":[177],"case.":[178],"This":[179],"aims":[181],"advance":[183],"design":[185],"trustworthy":[187],"resilient":[189],"AI-driven":[190],"systems":[191],"future":[193],"technologies.":[196]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-23T00:00:00"}
